Abstract.
Given the algebraic expression of the composition of two mappings how can one identify the two components? This is the problem of mapping decomposition, of which the usual function-decomposition problem [8] is a special case. It was believed that this problem is intractable in general. Some public key cryptosystems (PKC) are based on the difficulty of this mathematical problem. Two types of such PKCs are FAPKC, proposed by Tao [16], and the ``2R -schemes,'' proposed by Patarin and Goubin [11], [12]. FAPKC is based on composing finite automata (FA), while the ``2R -schemes'' use {quadratic functions} as the components. In this paper the decomposition problem for FA and for quadratic functions is investigated. Several methods for FA decomposing and one for quadratic functions are discovered. It is demonstrated that FA composition often exposes essential information about the components and that the full expression of composition of quadratic functions should not be given in 2R -schemes.
Article PDF
Similar content being viewed by others
Avoid common mistakes on your manuscript.
Author information
Authors and Affiliations
Additional information
Received November 1998 and revised October 2000 Online publication 9 March 2001
Rights and permissions
About this article
Cite this article
Ye, D., Dai, Z. & Lam, KY. Decomposing Attacks on Asymmetric Cryptography Based on Mapping Compositions. J. Cryptology 14, 137–150 (2001). https://doi.org/10.1007/s00145-001-0001-z
Published:
Issue Date:
DOI: https://doi.org/10.1007/s00145-001-0001-z